During a company-wide initiative to harden network security, it is discovered that end users who
have laptops cannot be removed from the local administrator group. Which of the following could
be used to help mitigate the risk of these machines becoming compromised?
A.
Security log auditing
B.
Firewalls
C.
HIPS
D.
IDS